We've noticed this is not your region.
Redirect me to my region
What do you want to learn today?

Details

About the Course

The course is designed with methods of analyzing mobile application and conducting penetration testing which involves ethical hacking or attacks mimicking real time for finding out the vulnerabilities of mobile applications. You will get the knowledge of mobile operating systems, mobile administration and other related domains. This course includes the study of security flow in web applications and aims for combating security threats to mobile applications. Simulations of hacker attacks on mobile applications are employed to teach the students to find the weaknesses in mobile applications and to create a detailed report of the vulnerabilities identified during a penetration test.

Why should you take up the course?

  • You can learn the possible mobile application vulnerabilities and be prepared to defend your organization’s reputation.
  • You will learn to create a mobile testing environment with penetration testing tools.
  • You will learn to check the device from a mobile forensics perspective and to know about built-in OS mechanisms so that you can stop or mitigate them.

Key Features
  • 32 Hours of excellent learning.
  • Customized Batch Timings.
  • We are EC-Council’s Accredited Training Partner (ATP).
  • Complete guidance on clearing Mobile Testing certification.
  • E-kit or study material.
  • Certified and Expert Trainers.
  • Up to date syllabus.

Outline

Course Outline
  • Introduction to Android.
  • Android Security Architecture.
  • Android Permissions.
  • Android Application Internals.
  • Android Application Components.
  • Introduction to Android Debug Bridge.
  • Reversing Android Applications.
  • Analyzing Android Malware.
  • Analyzing Android Traffic.
  • Bypassing SSL Pinning.
  • Backup-Based Vulnerability.
  • Exploiting Webview with Metasploit.
  • Introduction to iOS.
  • iOS Application Basics.
  • MVC and Event Driven Architecture.
  • ARM Processor.
  • iOS Security Mechanisms.
  • Creating a Pentest Platform.
  • Runtime Analysis with Cycript.
  • Mobile Substrate.
  • iOS Forensics Basics.
  • iOS Malware.
  • Decrypting Applications and Class Dumping on iOS.
Reviews
Be the first to write a review about this course.
Write a Review

Triad Square Infosec Pvt Ltd., is a fast growing Indian Multi-Spectrum Company in verticals of Information Security Consulting, Training & end to end Talent Acquisition, partnering with many of the leading companies in major industries.

We provide technology solutions, professional services and consultation in the Information Security domain. Our unique blend of Security Expertise enables us to give our customers most practical solutions to their problems.

Visit our website : www.triadsquare.com

Sending Message
Please wait...
× × Speedycourse.com uses cookies to deliver our services. By continuing to use the site, you are agreeing to our use of cookies, Privacy Policy, and our Terms & Conditions.